The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
The framework also exposes a powerful user authentication and access control subsystem that you can customize it to meet the requirements of almost any Web application.
该框架还公开一个强大的用户身份验证和访问控制系统,通过定制它几乎可以满足任意web应用程序的需求。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
应用推荐